메뉴 건너뛰기




Volumn , Issue , 2006, Pages 215-220

Pseudo randomized sequence number based solution to 802.11 disassociation denial of service attack

Author keywords

802.11; Denial of service DoS; Disassociation; MAC spoof detection; Sequence number; Wireless security

Indexed keywords

COMPUTER CRIME; INFORMATION SCIENCE; LOCAL AREA NETWORKS; MOBILE COMPUTING; SECURITY OF DATA; STANDARDS; TELECOMMUNICATION; TELECOMMUNICATION TRAFFIC; TRANSMISSION CONTROL PROTOCOL; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 47249138707     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MCWC.2006.4375224     Document Type: Conference Paper
Times cited : (24)

References (34)
  • 1
    • 47249131952 scopus 로고    scopus 로고
    • IEEE Standard 802.11-1999. Wireless LAN Medium Access Control and Physical Layer Specifications. 1999.
    • IEEE Standard 802.11-1999. Wireless LAN Medium Access Control and Physical Layer Specifications. 1999.
  • 2
    • 47249128427 scopus 로고    scopus 로고
    • R. L. Rivest. The RC4 Encryption Algorithm. RSA Data Security, Inc., Mar. 12, 1992. (Proprietary).
    • R. L. Rivest. The RC4 Encryption Algorithm. RSA Data Security, Inc., Mar. 12, 1992. (Proprietary).
  • 3
    • 0004104571 scopus 로고    scopus 로고
    • Unsafe At Any Key Size: An Analysis of the WEP Encapsulation,
    • 03628E, IEEE 802.11 Committee, Mar
    • J. Walker, Unsafe At Any Key Size: An Analysis of the WEP Encapsulation, tech. report 03628E, IEEE 802.11 Committee, Mar. 2000.
    • (2000) tech. report
    • Walker, J.1
  • 6
    • 0003477171 scopus 로고    scopus 로고
    • Using the Fluhrer, Mantin, and Shamir Attack to Break WEP
    • Tech. Report TD-4ZCPZZ, AT&T Labs
    • A.Stubblefield, J.Ioannidis, A.Rubin, Using the Fluhrer, Mantin, and Shamir Attack to Break WEP. Tech. Report TD-4ZCPZZ, AT&T Labs
    • Stubblefield, A.1    Ioannidis, J.2    Rubin, A.3
  • 9
    • 47249090781 scopus 로고    scopus 로고
    • Core SDI. CRC32 compensation attack against ssh-1.5, July 1998: www.coresdi.com
    • Core SDI. CRC32 compensation attack against ssh-1.5, July 1998: www.coresdi.com
  • 11
    • 47249109269 scopus 로고    scopus 로고
    • Airsnort: airsnort.shmoo.com
    • Airsnort: airsnort.shmoo.com
  • 12
    • 47249100553 scopus 로고    scopus 로고
    • Aircrack: www.cr0.net:8040/code/network/
    • Aircrack
  • 13
    • 47249100116 scopus 로고    scopus 로고
    • WepLab: weplab.sourceforge.net/
    • WepLab: weplab.sourceforge.net/
  • 14
    • 47249105877 scopus 로고    scopus 로고
    • Airjack: sourceforge.net/projects/airjack
    • Airjack: sourceforge.net/projects/airjack/
  • 15
    • 47249101949 scopus 로고    scopus 로고
    • KisMAC: binaervarianz.de/projekte/
    • KisMAC: binaervarianz.de/projekte/
  • 16
    • 47249090339 scopus 로고    scopus 로고
    • Void11: www.wlsec.net/void11/
    • Void11
  • 17
    • 47249116015 scopus 로고    scopus 로고
    • IEEE P802.11i - 2004. Medium Access Control Security Enhancements. July 2004
    • IEEE P802.11i - 2004. Medium Access Control Security Enhancements. July 2004
  • 18
    • 47249163161 scopus 로고    scopus 로고
    • Advanced Encryption Standard (FIPS PUB 197). National Institute of Standards and Technology (NIST), November 2001.
    • "Advanced Encryption Standard (FIPS PUB 197)." National Institute of Standards and Technology (NIST), November 2001.
  • 19
    • 47249165493 scopus 로고    scopus 로고
    • IEEE Standard 802.1X-2004 Port-Based Network Access Control. December, 2004
    • IEEE Standard 802.1X-2004 Port-Based Network Access Control. December, 2004
  • 21
    • 0013046241 scopus 로고    scopus 로고
    • An initial security analysis of the IEEE 802. IX standard. Technical Report
    • Dept. Of CS, Univ. of Maryland, Feb
    • A. Mishra and W. A. Arbaugh, An initial security analysis of the IEEE 802. IX standard. Technical Report, UMIACS-TR-2002-10, Dept. Of CS, Univ. of Maryland, Feb. 2002.
    • (2002) UMIACS-TR-2002-10
    • Mishra, A.1    Arbaugh, W.A.2
  • 22
    • 47249141558 scopus 로고    scopus 로고
    • AusCERT. Denial of Service Vulnerability in IEEE 802.11 Wireless Devices . AusCERT AA-2004.02, Australian Computer Emergency Response Team, www.auscert.org.au/ ,2004.
    • AusCERT. Denial of Service Vulnerability in IEEE 802.11 Wireless Devices . AusCERT AA-2004.02, Australian Computer Emergency Response Team, www.auscert.org.au/ ,2004.
  • 23
    • 84925368904 scopus 로고    scopus 로고
    • 802.11 Denial-of-Service attacks: Real vulnerabilities and practical solutions
    • August
    • J. Bellardo, and S. Savage. 802.11 Denial-of-Service attacks: real vulnerabilities and practical solutions. In Proc. of the USENIX Security Symposium, pp. 15-28, August, 2003.
    • (2003) Proc. of the USENIX Security Symposium , pp. 15-28
    • Bellardo, J.1    Savage, S.2
  • 25
    • 47249159295 scopus 로고    scopus 로고
    • J. Wright, Detecting Wireless LAN MAC Address Spoofing, home.jwu.edu/jwright
    • J. Wright, Detecting Wireless LAN MAC Address Spoofing, home.jwu.edu/jwright/
  • 30
    • 47249134897 scopus 로고    scopus 로고
    • Relationship-based Detection of Spoofing and Anomalous Traffic in Wireless Networks
    • Q. Li, W. Trappe, Relationship-based Detection of Spoofing and Anomalous Traffic in Wireless Networks, Presentation, www.winlab.rutgers.edu/pub/docs/iab/ 2005Fall/
    • Presentation
    • Li, Q.1    Trappe, W.2
  • 31
    • 47249152152 scopus 로고    scopus 로고
    • Detecting and Blocking Unauthorized Access in Wi-Fi Networks
    • H. Xia, and J. Brustoloni, Detecting and Blocking Unauthorized Access in Wi-Fi Networks. In Proc. of Networking'2004
    • Proc. of Networking'2004
    • Xia, H.1    Brustoloni, J.2
  • 32
    • 47249143601 scopus 로고    scopus 로고
    • SpoofMAC
    • SpoofMAC: www.klcconsulting.net/smac/
  • 33
    • 47249139393 scopus 로고    scopus 로고
    • Airsnarf: airsnarf.shmoo.com
    • Airsnarf: airsnarf.shmoo.com


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.